Sciweavers

339 search results - page 11 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
106
Voted
WCET
2010
14 years 9 months ago
Towards WCET Analysis of Multicore Architectures Using UPPAAL
To take full advantage of the increasingly used shared-memory multicore architectures, software algorithms will need to be parallelized over multiple threads. This means that thre...
Andreas Gustavsson, Andreas Ermedahl, Björn L...
121
Voted
ICIAR
2005
Springer
15 years 5 months ago
Unequal Error Protection Using Convolutional Codes for PCA-Coded Images
Image communication is a significant research area which involves improvement in image coding and communication techniques. In this paper, Principal Component Analysis (PCA) is use...
Sabina Hosic, Aykut Hocanin, Hasan Demirel
TIT
2002
91views more  TIT 2002»
14 years 11 months ago
On limited-delay lossy coding and filtering of individual sequences
Abstract--We continue the study of adaptive schemes for the sequential lossy coding of individual sequences which was recently initiated by Linder and Lugosi. Specifically, we cons...
Tsachy Weissman, Neri Merhav
HPCA
2008
IEEE
16 years 23 hour ago
Uncovering hidden loop level parallelism in sequential applications
As multicore systems become the dominant mainstream computing technology, one of the most difficult challenges the industry faces is the software. Applications with large amounts ...
Hongtao Zhong, Mojtaba Mehrara, Steven A. Lieberma...